product faq

Frequently Asked Questions​


The Raptor scanner collects the ID photo, first name, last name, date of birth, and the last four digits of
the license number. If two or more visitors have the same first
name, last name, and date of birth, Raptor uses the last four digits of the license number to differentiate
between them. Only the minimum data needed to accurately identify an entrant is collected (i.e., no
address information, no Social Security numbers, no physical characteristic data, etc.). No other data is
collected from the ID and a photocopy of the ID is not retained.

Client data is retained until the client requests, in writing, that the data be deleted. This deletion can be
performed at any time, but cannot be undone.

The data is used to keep a log of all visitors and other entry data. The Raptor system uses the visitor’s
first name, last name, and date of birth to check against two databases: 1) a database of registered sex
offenders in all 50 U.S. states, and 2) a custom database populated by school administrative personnel
which contains custom alerts such as custodial orders, known gang members, etc.

In addition to requiring unique usernames and passwords for each user of the Raptor system, the
system utilizes firewalls, intrusion prevention systems, host integrity monitoring, and port filtering as
well as the latest security processes and procedures to protect all its systems. All information
transmitted to the Raptor Technologies servers during the login/sign in process is encrypted using 256-
bit AES encryption and utilizes a nationally-recognized cloud provider.

The Raptor system does not collocate, but rather uses a nationally-recognized cloud provider with
decades of experience in data center security.

All communications are fully encrypted when in transit using 256-bit AES encryption.

District/school employees have different access to the data based on their job requirements and
associated permissions. User permissions are set by the district/school. Front desk personnel are
generally restricted to sign in/sign out entrants and generate reports.

Whether an entrant can review their data is up to the district/school and should be clearly stated in the
district/school’s visitor response policy.

The Raptor system is a proprietary application based on the Microsoft stack of tools and products.

Emergency Management
Raptor® Background Screening

When the volunteer application is submitted, information is sent to JD Palatine to complete the
background check.

Depending on the district’s policy, volunteers are either automatically approved if the background check
returns no negative data, or each volunteer can be manually approved by a district user.

Scroll to Top